Skip to content

Commit e4d5fc8

Browse files
authored
Fix date and terminology in recommendations reference
Updated date format and corrected 'allowlist' terminology throughout the document.
1 parent 7eff7b5 commit e4d5fc8

1 file changed

Lines changed: 5 additions & 5 deletions

File tree

articles/defender-for-cloud/recommendations-reference-compute.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article lists all Microsoft Defender for Cloud compute securit
44
author: Elazark
55
ms.service: defender-for-cloud
66
ms.topic: reference
7-
ms.date: 05/18/2025
7+
ms.date: 03/30/2026
88
ms.author: elkrieger
99
ms.custom: generated
1010
ai-usage: ai-assisted
@@ -45,10 +45,10 @@ To learn about actions that you can take in response to these recommendations, s
4545

4646
**Severity**: High
4747

48-
### Allowlist rules in your adaptive application control policy should be updated
48+
### Allow list rules in your adaptive application control policy should be updated
4949

5050
**Description**: Monitor for changes in behavior on groups of machines configured for auditing by Defender for Cloud's adaptive application controls. Defender for Cloud uses machine learning to analyze the running processes on your machines and suggest a list of known-safe applications. These are presented as recommended apps to allow in adaptive application control policies.
51-
(Related policy: [Allowlist rules in your adaptive application control policy should be updated](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f123a3936-f020-408a-ba0c-47873faf1534)).
51+
(Related policy: [Allow list rules in your adaptive application control policy should be updated](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f123a3936-f020-408a-ba0c-47873faf1534)).
5252

5353
**Severity**: High
5454

@@ -279,7 +279,7 @@ Replaces the older recommendation *Virtual machines should encrypt temp disks, c
279279

280280
### Linux virtual machines should use only signed and trusted boot components
281281

282-
**Description**: With Secure Boot enabled, all OS boot components (boot loader, kernel, kernel drivers) must be signed by trusted publishers. Defender for Cloud has identified untrusted OS boot components on one or more of your Linux machines. To protect your machines from potentially malicious components, add them to your allowlist or remove the identified components.
282+
**Description**: With Secure Boot enabled, all OS boot components (boot loader, kernel, kernel drivers) must be signed by trusted publishers. Defender for Cloud has identified untrusted OS boot components on one or more of your Linux machines. To protect your machines from potentially malicious components, add them to your allow list or remove the identified components.
283283
(No related policy)
284284

285285
**Severity**: Low
@@ -771,7 +771,7 @@ If you enable the interactive serial console on an instance, clients can attempt
771771
A virtual machine instance has four virtual serial ports. Interacting with a serial port is similar to using a terminal window, in that input and output is entirely in text mode and there's no graphical interface or mouse support.
772772
The instance's operating system, BIOS, and other system-level entities often write output to the serial ports, and can accept input such as commands or answers to prompts.
773773
Typically, these system-level entities use the first serial port (port 1) and serial port 1 is often referred to as the serial console.
774-
The interactive serial console doesn't support IP-based access restrictions such as IP allowlists. If you enable the interactive serial console on an instance, clients can attempt to connect to that instance from any IP address.
774+
The interactive serial console doesn't support IP-based access restrictions such as IP allow lists. If you enable the interactive serial console on an instance, clients can attempt to connect to that instance from any IP address.
775775
This allows anybody to connect to that instance if they know the correct SSH key, username, project ID, zone, and instance name.
776776
Therefore interactive serial console support should be disabled.
777777

0 commit comments

Comments
 (0)